Now you can use the cloud model to extend your corporate security perimeter to all devices in any location—and deliver the same scalability and outstanding protection many of the world’s largest companies provide to their employees, suppliers, partners, and customers.

As mobile workers leave the corporate network, they become more susceptible to threats because corporate policies and protection do not follow them. Blue Coat web security solutions extend the security perimeter of the corporate network.

Blue Coat empowers enterprises to safely and securely choose the best, applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets.

Blue Coat Labs

Labs Blog

A New Twist in Fake-warez Malware

A New Twist in Fake-warez Malware

It's been a while since I've posted anything from the world of "fake warez" malware.

Last week I came across a site that's using a different tactic than the "classic" method. On the surface, it looks very similar:

But when I clicked a sample link (I chose "corel 2000" out of random curiosity), instead of a link to a malware executable coming from a separate (and temporary) malware host, I was presented with a corel_2000_keygen.zip file instead of a malware executable.

When I downloaded and opened the ZIP, I found an EXE file (named corel_2000_keygen.exe of course) and a very small readme.txt file that basically said "run corel_2000_keygen.exe and follow instructions".

Running the EXE through Virustotal showed that it was very well detected (31/43 hits). (Interestingly, when I ran the ZIP file through, the detection rate dropped to 27/42. I'll let you draw your own conclusions about that, as a non-password-protected ZIP file doesn't seem like it should thwart AV analysis....)